Auto-Update: 2023-08-18T04:00:32.292931+00:00

This commit is contained in:
cad-safe-bot 2023-08-18 04:00:35 +00:00
parent e4a2f0ebb1
commit 0aa98c62fe
29 changed files with 742 additions and 60 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-40982",
"sourceIdentifier": "secure@intel.com",
"published": "2023-08-11T03:15:14.823",
"lastModified": "2023-08-16T03:15:11.310",
"lastModified": "2023-08-18T03:15:08.847",
"vulnStatus": "Modified",
"descriptions": [
{
@ -68,7 +68,6 @@
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -16703,7 +16702,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -16729,7 +16727,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -16841,6 +16838,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/",
"source": "secure@intel.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/",
"source": "secure@intel.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41804",
"sourceIdentifier": "secure@intel.com",
"published": "2023-08-11T03:15:15.063",
"lastModified": "2023-08-17T20:33:48.690",
"vulnStatus": "Analyzed",
"lastModified": "2023-08-18T03:15:14.097",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -5231,6 +5231,10 @@
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/",
"source": "secure@intel.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/",
"source": "secure@intel.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23908",
"sourceIdentifier": "secure@intel.com",
"published": "2023-08-11T03:15:18.510",
"lastModified": "2023-08-16T03:15:26.350",
"lastModified": "2023-08-18T03:15:15.527",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
"url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html",
"source": "secure@intel.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/",
"source": "secure@intel.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/",
"source": "secure@intel.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28535",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-14T15:15:10.807",
"lastModified": "2023-08-14T15:58:29.657",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-18T03:19:13.633",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -36,7 +56,7 @@
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -44,12 +64,43 @@
"value": "CWE-79"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:commoninja:paytm_payment_donation:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.2.0",
"matchCriteriaId": "8ACD0A7D-8761-4A47-B320-6B6B1A96EE6F"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/paytm-donation/wordpress-paytm-payment-donation-plugin-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,39 +2,114 @@
"id": "CVE-2023-30186",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-14T13:15:10.420",
"lastModified": "2023-08-14T13:26:38.470",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-18T03:21:09.943",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A use after free issue discovered in ONLYOFFICE DocumentServer 4.0.3 through 7.3.2 allows remote attackers to run arbitrary code via crafted JavaScript file."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:onlyoffice:document_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.3",
"versionEndIncluding": "7.3.2",
"matchCriteriaId": "F05076E0-A23D-4BEE-B161-248ACEFEA307"
}
]
}
]
}
],
"references": [
{
"url": "http://onlyoffice.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://gist.github.com/merrychap/25eba8c4dd97c9e545edad1b8f0eadc2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/ONLYOFFICE/DocumentServer",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/ONLYOFFICE/core/blob/8ca40a44ce47a86168327a46db91253cf6bb205d/DesktopEditor/doctrenderer/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/ONLYOFFICE/core/blob/8ca40a44ce47a86168327a46db91253cf6bb205d/DesktopEditor/doctrenderer/embed/NativeControlEmbed.cpp#L110",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://github.com/ONLYOFFICE/core/commit/2b6ad83b36afd9845085b536969d366d1d61150a",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,39 +2,114 @@
"id": "CVE-2023-30187",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-14T13:15:10.527",
"lastModified": "2023-08-14T13:26:38.470",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-18T03:20:19.403",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An out of bounds memory access vulnerability in ONLYOFFICE DocumentServer 4.0.3 through 7.3.2 allows remote attackers to run arbitrary code via crafted JavaScript file."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:onlyoffice:document_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.3",
"versionEndIncluding": "7.3.2",
"matchCriteriaId": "F05076E0-A23D-4BEE-B161-248ACEFEA307"
}
]
}
]
}
],
"references": [
{
"url": "http://onlyoffice.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://gist.github.com/merrychap/25eba8c4dd97c9e545edad1b8f0eadc2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/ONLYOFFICE/DocumentServer",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/ONLYOFFICE/core/blob/8ca40a44ce47a86168327a46db91253cf6bb205d/DesktopEditor/doctrenderer/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/ONLYOFFICE/core/blob/8ca40a44ce47a86168327a46db91253cf6bb205d/DesktopEditor/doctrenderer/embed/NativeControlEmbed.cpp#L110",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://github.com/ONLYOFFICE/core/commit/2b6ad83b36afd9845085b536969d366d1d61150a",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,39 +2,114 @@
"id": "CVE-2023-30188",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-14T13:15:10.720",
"lastModified": "2023-08-14T13:26:38.470",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-18T03:19:32.193",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Memory Exhaustion vulnerability in ONLYOFFICE Document Server 4.0.3 through 7.3.2 allows remote attackers to cause a denial of service via crafted JavaScript file."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:onlyoffice:document_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.3",
"versionEndIncluding": "7.3.2",
"matchCriteriaId": "F05076E0-A23D-4BEE-B161-248ACEFEA307"
}
]
}
]
}
],
"references": [
{
"url": "http://onlyoffice.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://gist.github.com/merrychap/25eba8c4dd97c9e545edad1b8f0eadc2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/ONLYOFFICE/DocumentServer",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/ONLYOFFICE/core/blob/8ca40a44ce47a86168327a46db91253cf6bb205d/DesktopEditor/doctrenderer/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/ONLYOFFICE/core/blob/8ca40a44ce47a86168327a46db91253cf6bb205d/DesktopEditor/doctrenderer/embed/NativeControlEmbed.cpp#L110",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://github.com/ONLYOFFICE/core/commit/2b6ad83b36afd9845085b536969d366d1d61150a",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,27 +2,89 @@
"id": "CVE-2023-37847",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-14T12:15:09.593",
"lastModified": "2023-08-14T13:06:15.630",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-18T03:21:16.680",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "novel-plus v3.6.2 was discovered to contain a SQL injection vulnerability."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novel-plus:novel-plus:3.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0EB8589F-52EE-4132-AD9B-8C5F03830663"
}
]
}
]
}
],
"references": [
{
"url": "http://novel-plus.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/KingBangQ/CVE-2023-37847/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "https://novel.xxyopen.com/index.htm",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-38133",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-07-27T00:15:15.620",
"lastModified": "2023-08-07T08:15:14.403",
"lastModified": "2023-08-18T03:15:15.633",
"vulnStatus": "Modified",
"descriptions": [
{
@ -118,6 +118,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/",
"source": "product-security@apple.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213841",
"source": "product-security@apple.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-38572",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-07-27T01:15:36.913",
"lastModified": "2023-08-07T08:15:14.517",
"lastModified": "2023-08-18T03:15:15.847",
"vulnStatus": "Modified",
"descriptions": [
{
@ -121,6 +121,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/",
"source": "product-security@apple.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213841",
"source": "product-security@apple.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-38592",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-07-28T05:15:10.873",
"lastModified": "2023-08-07T08:15:14.623",
"lastModified": "2023-08-18T03:15:18.470",
"vulnStatus": "Modified",
"descriptions": [
{
@ -103,6 +103,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/",
"source": "product-security@apple.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213841",
"source": "product-security@apple.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-38594",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-07-27T00:15:15.887",
"lastModified": "2023-08-07T08:15:14.733",
"lastModified": "2023-08-18T03:15:20.620",
"vulnStatus": "Modified",
"descriptions": [
{
@ -118,6 +118,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/",
"source": "product-security@apple.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213841",
"source": "product-security@apple.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-38595",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-07-27T01:15:37.767",
"lastModified": "2023-08-07T08:15:14.817",
"lastModified": "2023-08-18T03:15:21.080",
"vulnStatus": "Modified",
"descriptions": [
{
@ -107,6 +107,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/",
"source": "product-security@apple.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213841",
"source": "product-security@apple.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-38597",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-07-27T00:15:16.030",
"lastModified": "2023-08-07T08:15:14.917",
"lastModified": "2023-08-18T03:15:21.277",
"vulnStatus": "Modified",
"descriptions": [
{
@ -106,6 +106,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/",
"source": "product-security@apple.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213841",
"source": "product-security@apple.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-38599",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-07-28T05:15:10.997",
"lastModified": "2023-08-07T08:15:15.023",
"lastModified": "2023-08-18T03:15:21.417",
"vulnStatus": "Modified",
"descriptions": [
{
@ -121,6 +121,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/",
"source": "product-security@apple.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213841",
"source": "product-security@apple.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-38600",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-07-27T01:15:38.187",
"lastModified": "2023-08-07T08:15:15.113",
"lastModified": "2023-08-18T03:15:21.557",
"vulnStatus": "Modified",
"descriptions": [
{
@ -107,6 +107,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/",
"source": "product-security@apple.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213841",
"source": "product-security@apple.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-38611",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-07-27T01:15:39.303",
"lastModified": "2023-08-07T08:15:15.203",
"lastModified": "2023-08-18T03:15:21.647",
"vulnStatus": "Modified",
"descriptions": [
{
@ -107,6 +107,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/",
"source": "product-security@apple.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213841",
"source": "product-security@apple.com",

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-39665",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-18T03:15:21.787",
"lastModified": "2023-08-18T03:15:21.787",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED ** D-Link DIR-868L fw_revA_1-12_eu_multi_20170316 was discovered to contain a buffer overflow via the acStack_50 parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/DIR-868L-bufferoverflow.md",
"source": "cve@mitre.org"
},
{
"url": "https://support.dlink.com/",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-39666",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-18T03:15:21.913",
"lastModified": "2023-08-18T03:15:21.913",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "D-Link DIR-842 fw_revA_1-02_eu_multi_20151008 was discovered to contain multiple buffer overflows in the fgets function via the acStack_120 and acStack_220 parameters."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/DIR-842%20buffer%20overflow.md",
"source": "cve@mitre.org"
},
{
"url": "https://support.dlink.com/",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-39667",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-18T03:15:22.020",
"lastModified": "2023-08-18T03:15:22.020",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED ** D-Link DIR-868L fw_revA_1-12_eu_multi_20170316 was discovered to contain a buffer overflow via the param_2 parameter in the FUN_0000acb4 function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/DIR-868L%20httpd-Improper%20Input%20Validation.md",
"source": "cve@mitre.org"
},
{
"url": "https://support.dlink.com/",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-39668",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-18T03:15:22.103",
"lastModified": "2023-08-18T03:15:22.103",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED ** D-Link DIR-868L fw_revA_1-12_eu_multi_20170316 was discovered to contain a buffer overflow via the param_2 parameter in the inet_ntoa() function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/DIR-868L%20Buffer%20overflow%202.md",
"source": "cve@mitre.org"
},
{
"url": "https://support.dlink.com/",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-39669",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-18T03:15:22.250",
"lastModified": "2023-08-18T03:15:22.250",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "D-Link DIR-880 A1_FW107WWb08 was discovered to contain a NULL pointer dereference in the function FUN_00010824."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/880%20unchecked%20return%20value.md",
"source": "cve@mitre.org"
},
{
"url": "https://support.dlink.com/",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-39670",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-18T03:15:22.413",
"lastModified": "2023-08-18T03:15:22.413",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Tenda AC6 _US_AC6V1.0BR_V15.03.05.16 was discovered to contain a buffer overflow via the function fgets."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Davidteeri/Bug-Report/blob/main/Tenda/AC6%20buffer%20overflow.md",
"source": "cve@mitre.org"
},
{
"url": "https://www.tendacn.com/download/list-3.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-39671",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-18T03:15:23.013",
"lastModified": "2023-08-18T03:15:23.013",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "D-Link DIR-880 A1_FW107WWb08 was discovered to contain a buffer overflow via the function FUN_0001be68."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/DIR880%20buffer%20overflow.md",
"source": "cve@mitre.org"
},
{
"url": "https://support.dlink.com/",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-39672",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-18T03:15:23.857",
"lastModified": "2023-08-18T03:15:23.857",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Tenda WH450 v1.0.0.18 was discovered to contain a buffer overflow via the function fgets."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Davidteeri/Bug-Report/blob/main/Tenda/WH450%20buffer%20overflow.md",
"source": "cve@mitre.org"
},
{
"url": "https://www.tendacn.com/download/list-3.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-39673",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-18T03:15:24.247",
"lastModified": "2023-08-18T03:15:24.247",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Tenda AC15 V1.0BR_V15.03.05.18_multi_TD01 was discovered to contain a buffer overflow via the function FUN_00010e34()."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Davidteeri/Bug-Report/blob/main/Tenda/AC15%20Impoper%20Input%20Validation.md",
"source": "cve@mitre.org"
},
{
"url": "https://www.tendacn.com/download/list-3.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-39674",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-18T03:15:24.347",
"lastModified": "2023-08-18T03:15:24.347",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "D-Link DIR-880 A1_FW107WWb08 was discovered to contain a buffer overflow via the function fgets."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/DIR880%20buffe%20overflow.md",
"source": "cve@mitre.org"
},
{
"url": "https://support.dlink.com/",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-40272",
"sourceIdentifier": "security@apache.org",
"published": "2023-08-17T14:15:10.083",
"lastModified": "2023-08-17T19:15:13.143",
"lastModified": "2023-08-18T03:15:24.437",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -28,6 +28,10 @@
"url": "http://www.openwall.com/lists/oss-security/2023/08/17/1",
"source": "security@apache.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/08/18/1",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/t03gktyzyor20rh06okd91jtqmw6k1l7",
"source": "security@apache.org"

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-08-18T02:00:33.660955+00:00
2023-08-18T04:00:32.292931+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-08-18T00:15:10.663000+00:00
2023-08-18T03:21:16.680000+00:00
```
### Last Data Feed Release
@ -29,20 +29,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
222943
222953
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `10`
* [CVE-2023-39125](CVE-2023/CVE-2023-391xx/CVE-2023-39125.json) (`2023-08-18T00:15:10.663`)
* [CVE-2023-39665](CVE-2023/CVE-2023-396xx/CVE-2023-39665.json) (`2023-08-18T03:15:21.787`)
* [CVE-2023-39666](CVE-2023/CVE-2023-396xx/CVE-2023-39666.json) (`2023-08-18T03:15:21.913`)
* [CVE-2023-39667](CVE-2023/CVE-2023-396xx/CVE-2023-39667.json) (`2023-08-18T03:15:22.020`)
* [CVE-2023-39668](CVE-2023/CVE-2023-396xx/CVE-2023-39668.json) (`2023-08-18T03:15:22.103`)
* [CVE-2023-39669](CVE-2023/CVE-2023-396xx/CVE-2023-39669.json) (`2023-08-18T03:15:22.250`)
* [CVE-2023-39670](CVE-2023/CVE-2023-396xx/CVE-2023-39670.json) (`2023-08-18T03:15:22.413`)
* [CVE-2023-39671](CVE-2023/CVE-2023-396xx/CVE-2023-39671.json) (`2023-08-18T03:15:23.013`)
* [CVE-2023-39672](CVE-2023/CVE-2023-396xx/CVE-2023-39672.json) (`2023-08-18T03:15:23.857`)
* [CVE-2023-39673](CVE-2023/CVE-2023-396xx/CVE-2023-39673.json) (`2023-08-18T03:15:24.247`)
* [CVE-2023-39674](CVE-2023/CVE-2023-396xx/CVE-2023-39674.json) (`2023-08-18T03:15:24.347`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `18`
* [CVE-2022-40982](CVE-2022/CVE-2022-409xx/CVE-2022-40982.json) (`2023-08-18T03:15:08.847`)
* [CVE-2022-41804](CVE-2022/CVE-2022-418xx/CVE-2022-41804.json) (`2023-08-18T03:15:14.097`)
* [CVE-2023-23908](CVE-2023/CVE-2023-239xx/CVE-2023-23908.json) (`2023-08-18T03:15:15.527`)
* [CVE-2023-38133](CVE-2023/CVE-2023-381xx/CVE-2023-38133.json) (`2023-08-18T03:15:15.633`)
* [CVE-2023-38572](CVE-2023/CVE-2023-385xx/CVE-2023-38572.json) (`2023-08-18T03:15:15.847`)
* [CVE-2023-38592](CVE-2023/CVE-2023-385xx/CVE-2023-38592.json) (`2023-08-18T03:15:18.470`)
* [CVE-2023-38594](CVE-2023/CVE-2023-385xx/CVE-2023-38594.json) (`2023-08-18T03:15:20.620`)
* [CVE-2023-38595](CVE-2023/CVE-2023-385xx/CVE-2023-38595.json) (`2023-08-18T03:15:21.080`)
* [CVE-2023-38597](CVE-2023/CVE-2023-385xx/CVE-2023-38597.json) (`2023-08-18T03:15:21.277`)
* [CVE-2023-38599](CVE-2023/CVE-2023-385xx/CVE-2023-38599.json) (`2023-08-18T03:15:21.417`)
* [CVE-2023-38600](CVE-2023/CVE-2023-386xx/CVE-2023-38600.json) (`2023-08-18T03:15:21.557`)
* [CVE-2023-38611](CVE-2023/CVE-2023-386xx/CVE-2023-38611.json) (`2023-08-18T03:15:21.647`)
* [CVE-2023-40272](CVE-2023/CVE-2023-402xx/CVE-2023-40272.json) (`2023-08-18T03:15:24.437`)
* [CVE-2023-28535](CVE-2023/CVE-2023-285xx/CVE-2023-28535.json) (`2023-08-18T03:19:13.633`)
* [CVE-2023-30188](CVE-2023/CVE-2023-301xx/CVE-2023-30188.json) (`2023-08-18T03:19:32.193`)
* [CVE-2023-30187](CVE-2023/CVE-2023-301xx/CVE-2023-30187.json) (`2023-08-18T03:20:19.403`)
* [CVE-2023-30186](CVE-2023/CVE-2023-301xx/CVE-2023-30186.json) (`2023-08-18T03:21:09.943`)
* [CVE-2023-37847](CVE-2023/CVE-2023-378xx/CVE-2023-37847.json) (`2023-08-18T03:21:16.680`)
## Download and Usage